Browse Definitions by Alphabet
- What is computer-aided software engineering (CASE)? - Computer-aided software engineering (CASE) describes a broad set of labor-saving tools and methods used in software development and business process modeling.
- What is configuration management? A comprehensive guide - Configuration management, or CM, is a governance and systems engineering process used to track and control IT resources, services and applications across an enterprise.
- What is contact center as a service (CCaaS)? - Contact center as a service (CCaaS) is a framework that combines contact center hosting principles and cloud-based contact center infrastructure.
- What is contact center infrastructure? - A contact center infrastructure (CCI) is a framework composed of the physical and virtual resources that a contact or call center facility needs to operate effectively.
- What is container management and why is it important? - Container management refers to a set of practices that govern and maintain containerization software.
- What is continuous data protection (CDP)? - Continuous data protection (CDP), also known as 'continuous backup,' is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made.
- What is continuous integration (CI)? - Continuous integration (CI) is a software development practice in which frequent and incremental changes are routinely added (integrated) to the complete codebase immediately after the changes and additions are tested and validated.
- What is continuous intelligence? - Continuous intelligence (CI) is a data analysis process that delivers real-time analytics and insights as a part of ongoing business operations.
- What is continuous modeling (data center continuous modeling)? - Continuous modeling is an approach to data center management that supplements infrastructure management (DCIM) tools with engineering simulation tools.
- What is contract lifecycle management? - Contract lifecycle management (CLM) is a systematic approach to managing a business contract at each stage.
- What is conversational AI (conversational artificial intelligence)? - Conversational AI, also known as conversational artificial intelligence, is a type of AI that enables computers to understand, process and generate human language.
- What is corporate performance management (CPM)? - Corporate performance management (CPM) encompasses the processes and methodologies used to align an organization's strategies and goals to its plans and actions as a business.
- What is corporate social responsibility (CSR)? - Corporate social responsibility (CSR) is a strategy undertaken by companies to not just grow profits, but also to take an active and positive social role in the world around them.
- What is CPQ software (configure price quote software)? - CPQ (configure, price, quote) is programming that helps sales representatives and self-service customers quickly generate accurate quotes for configurable products and services.
- What is cryptography? - Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is intended can read and process it.
- What is Current Procedural Terminology (CPT) code? - Current Procedural Terminology (CPT) is a medical code set that enables physicians and other healthcare providers to describe and report the medical, surgical, and diagnostic procedures and services they perform to government and private payers, researchers and other interested parties.
- What is customer experience (CX) and why is it important? - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
- What is customer experience management (CXM)? Ultimate guide - Building brand loyalty among customers involves a customer-centric strategy and measuring feedback through voice of the customer data to improve customer experiences.
- What is customer insight (consumer insight)? - Customer insight, or consumer insight, is the understanding and interpretation of customer data, behaviors and feedback into conclusions that can be used to drive actions that improve product development and customer support.
- What is customer intelligence (CI) and how does it help business? - Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources to gain insights about customer needs, motivations and behaviors.
- What is customer profiling? - Customer profiling is the detailed, systematic process of constructing a clear portrait of a company's ideal customer by gathering and analyzing information about their demographic, psychographic and behavioral attributes.
- What is customer segmentation? - Customer segmentation is the practice of dividing a customer base into groups of individuals that have similar characteristics relevant to marketing, such as age, gender, interests and spending habits.
- What is cyber attribution? - Cyber attribution is the process of tracking and identifying the perpetrator of a cyberattack or other cyber operation.
- What is cyber hygiene and why is it important? - Cyber hygiene, or cybersecurity hygiene, is a set of practices individuals and organizations perform regularly to maintain the health and security of users, devices, networks and data.
- What is cybercrime and how can you prevent it? - Cybercrime is any criminal activity that involves a computer, network or networked device.
- What is the CIA triad (confidentiality, integrity and availability)? - The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security within an organization.
- What is the Coalition for Secure AI (CoSAI)? - Coalition for Secure AI (CoSAI) is an open source initiative to enhance artificial intelligence's security.
- What is the Cybersecurity Information Sharing Act (CISA)? - The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.